Header menu link for other important links
X
Attribute Based Encryption for Deterministic Finite Automata from DLIN
, Monosij Maitra
Published in Springer
2019
Volume: 11892 LNCS
   
Pages: 91 - 117
Abstract
Waters [Crypto, 2012] provided the first attribute based encryption scheme ABE for Deterministic Finite Automata (DFA) from a parametrized or “q-type” assumption over bilinear maps. Obtaining a construction from static assumptions has been elusive, despite much progress in the area of ABE. In this work, we construct the first attribute based encryption scheme for DFA from static assumptions on pairings, namely, the DLIN assumption. Our scheme supports unbounded length inputs, unbounded length machines and unbounded key requests. In more detail, secret keys in our construction are associated with a DFA M of unbounded length, ciphertexts are associated with a tuple (x, �) where x is a public attribute of unbounded length and is a secret message bit, and decryption recovers � if and only if M(x) = 1.. Our techniques are at least as interesting as our final result. We present a simple compiler that combines constructions of unbounded ABE schemes for monotone span programs (MSP) in a black box way to construct ABE for DFA. In more detail, we find a way to embed DFA computation into monotone span programs, which lets us compose existing constructions (modified suitably) of unbounded key-policy ABE (kpABE) and unbounded ciphertext-policy ABE (cpABE) for MSP in a simple and modular way to obtain key-policy ABE for DFA. Our construction uses its building blocks in a symmetric way – by swapping the use of the underlying kpABE and cpABE, we also obtain a construction of ciphertext-policy ABE for DFA. Our work extends techniques developed recently by Agrawal, Maitra and Yamada [Crypto 2019], which show how to construct ABE that support unbounded machines and unbounded inputs by combining ABE schemes that are bounded in one co-ordinate. At the heart of our work is the observation that unbounded, multi-use ABE for MSP already achieve most of what we need to build ABE for DFA. © 2019, International Association for Cryptologic Research.
About the journal
JournalData powered by TypesetLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherData powered by TypesetSpringer
ISSN03029743
Open AccessNo
Concepts (12)
  •  related image
    Finite automata
  •  related image
    Program compilers
  •  related image
    Security of data
  •  related image
    ATTRIBUTE-BASED ENCRYPTION SCHEMES
  •  related image
    ATTRIBUTE-BASED ENCRYPTIONS
  •  related image
    Building blockes
  •  related image
    CIPHERTEXT POLICIES
  •  related image
    DETERMINISTIC FINITE AUTOMATA
  •  related image
    KEY POLICIES
  •  related image
    MONOTONE SPAN PROGRAMS
  •  related image
    SECRET MESSAGES
  •  related image
    Cryptography